Review on Methods of Authentication of Images with Data Repair Capability
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 12)Publication Date: 2016-12-05
Authors : Vrushali Chirmade; Dimple Chaudhari;
Page : 1054-1061
Keywords : cryptography; fragile watermarking; authentication tag; digital signature; hash function;
Abstract
Image authentication methods based on conventional cryptography, fragile watermarking, semi-fragile watermarking and on image content signatures discussed in this paper. For each group of methods the type of the authentication tag, the dependency of this authentication tag on the image, the type of the authentication service provided are shown, that is strict or content-based (selective) image authentication service, the localization capacity of the altered regions, as well as the possibility of restoration of image corrupted regions. Algorithms are also grouped according to the authentication tag that is used, and references are included. It can be noticed that one principal property of an image authentication system, the detection of malevolent manipulations. According to the summary table, algorithms performances are very similar. In fact, most of algorithms offer acceptable detection and localization of image manipulations while restoration performances still need to be improved.
Other Latest Articles
- Plotting of Partograph in View of Assessing its Implementation among the Nurses of Labour Room in Selected Hospitals at Vadodara
- Flood Early Warning System and Distribution of Information Communication Using Radio Link
- Studies on Physico-Chemical Parameters in Two Different Stations in Nagore Cauvery River Basin and Pattanachcheri Village at Nagore Coastal Region, Southeast Coast of Tamilnadu
- Demonetization ? Metamorphosis for Cashless India
- Characterization of Multiple Plant Growth Promoting Traits of Serratia Spp. Associated With Vegetables Rhizospheric Soil
Last modified: 2021-07-01 14:48:53